Showing 1 - 20 results of 33 for search '(((( develop post algorithm ) OR ( movement data algorithm ))) OR ( data hiding algorithm ))', query time: 0.13s Refine Results
  1. 1

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm by Abu Zitar, Raed

    Published 2022
    “…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …”
    Get full text
  2. 2

    Bird’s Eye View feature selection for high-dimensional data by Samir Brahim Belhaouari (16855434)

    Published 2023
    “…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
  3. 3

    A Survey and Comparison of Post-Quantum and Quantum Blockchains by Zebo Yang (18441096)

    Published 2023
    “…The first approach involves post-quantum blockchains, which aim to utilize classical cryptographic algorithms resilient to quantum attacks. …”
  4. 4

    Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care by Barry Solaiman (19160614)

    Published 2024
    “…<p>This article proposes a framework for examining the ethical and legal concerns for using artificial intelligence (AI) in post-acute and long-term care (PA-LTC). It argues that established frameworks on health, AI, and the law should be adapted to specific care contexts. …”
  5. 5

    Particle swarm optimization algorithm: review and applications by Abualigah, Laith

    Published 2024
    “…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …”
    Get full text
  6. 6

    RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems. by Sebastian Kruse (18595195)

    Published 2020
    “…Our main contributions are: (i) a mechanism based on graph transformations to explore alternative execution strategies; (ii) a novel graph-based approach to determine efficient data movement plans among subtasks and platforms; and (iii) an efficient plan enumeration algorithm, based on a novel enumeration algebra. …”
  7. 7
  8. 8

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…<p dir="ltr">Pressure gradient (PG) in liquid-liquid flow is one of the key components to design an energy-efficient transportation system for wellbores. This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …”
  9. 9

    Towards Scalable Process Mining Pipelines by Mohamed, Belal

    Published 2023
    “…Contributions have covered the spectrum of better algorithms, richer comparison metrics, and movement towards online analysis for process data. …”
    Get full text
    Get full text
    Get full text
  10. 10

    A Fuzzy Low-Dimensional Intersection Graph Representation Approach for Graph Compression and Anonymization by Yamout, Youssef

    Published 2021
    “…The large amount of data represented as a network, or graph, sometimes exceeds the resources of a conventional computing device. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 11
  12. 12

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  13. 13

    Digital Image Watermarking Using Balanced Multiwavelets by Ghouti, L.

    Published 2006
    “…The statistical model is based on a generalized Gaussian distribution. Limits of data hiding capacity clearly show that balanced multiwavelets provide higher watermarking rates. …”
    Get full text
    article
  14. 14
  15. 15
  16. 16

    Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks by Sharma, Neetan

    Published 2023
    “…A case study has been done in the Peer Panjal region. The data collected for four months with various parameters have been applied randomly as input data using GD and LM type of artificial neural network compared to actual solar energy data. …”
    Get full text
  17. 17

    Automated skills assessment in open surgery: A scoping review by Hawa Hamza (17707224)

    Published 2025
    “…The assessment input for the automation algorithms were predominantly hand movement. Around 37.5 % (<i>n </i>= 15) of the studies assessed algorithm performance using classification accuracy. …”
  18. 18
  19. 19

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…These were subjected to two different processes called contrast enhancement and segmentation of vein regions. Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
  20. 20

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…This paper reports on an innovative and comprehensive method proposed for the quality control of drilled shafts that overcomes several limitations of conventional methods. The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article